Defense- in-depth IOC breach exploit virus passphrase PII IP BEC Security Operations risk assessment CIA triad vishing integrity insider threat IDS WISP compliance business continuity defense evasion APT social engineering SyssecAdmin IPS risk password OS pentest vulnerability incident VPN DDoS confidentiality antivirus escalation resilience PHI network ransomware cryptography phishing spoofing spam spyware availability MFA HIPAA security awareness hacker worm smishing packet Dark Web admin IoT Proofpoint bug training botnet security policy Cyber Security zero- day Cyber Defense malware rootkit EDR incident response FTP identity theft encryption cyber attack firewall Defense- in-depth IOC breach exploit virus passphrase PII IP BEC Security Operations risk assessment CIA triad vishing integrity insider threat IDS WISP compliance business continuity defense evasion APT social engineering SyssecAdmin IPS risk password OS pentest vulnerability incident VPN DDoS confidentiality antivirus escalation resilience PHI network ransomware cryptography phishing spoofing spam spyware availability MFA HIPAA security awareness hacker worm smishing packet Dark Web admin IoT Proofpoint bug training botnet security policy Cyber Security zero- day Cyber Defense malware rootkit EDR incident response FTP identity theft encryption cyber attack firewall
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Defense-in-depth
IOC
breach
exploit
virus
passphrase
PII
IP
BEC
Security Operations
risk assessment
CIA triad
vishing
integrity
insider threat
IDS
WISP
compliance
business continuity
defense evasion
APT
social engineering
SyssecAdmin
IPS
risk
password
OS
pentest
vulnerability
incident
VPN
DDoS
confidentiality
antivirus
escalation
resilience
PHI
network
ransomware
cryptography
phishing
spoofing
spam
spyware
availability
MFA
HIPAA
security awareness
hacker
worm
smishing
packet
Dark Web
admin
IoT
Proofpoint
bug
training
botnet
security policy
Cyber Security
zero-day
Cyber Defense
malware
rootkit
EDR
incident response
FTP
identity theft
encryption
cyber attack
firewall